Possible Reinforcements of RSA and Some Other Encryption Methods

Authors

  • Huini Xu
  • Qiyuan Sun

DOI:

https://doi.org/10.62051/ijcsit.v8n3.06

Keywords:

RSA, Multi-prime RSA, Goldwasser–Micali, LUC Cryptosystem, Public-key Cryptography

Abstract

This paper explores potential reinforcements of the RSA algorithm and examines several alternative public-key cryptosystems. Building on the mathematical foundation of integer factorization, RSA has been the cornerstone of secure digital communication, yet it faces vulnerabilities from parameter weaknesses and emerging quantum algorithms. To address efficiency and resilience, this study first analyzes multi-prime RSA, highlighting its advantages in decryption speed through the Chinese Remainder Theorem, while also noting its reduced security margins. In addition, the Goldwasser–Micali cryptosystem is evaluated for its probabilistic encryption mechanism, which enhances semantic security by producing randomized ciphertexts. The LUC encryption scheme, based on Lucas sequences, is then discussed as a variant of RSA with potentially stronger resistance against certain attacks. Finally, an algebraic encryption method utilizing polynomial roots is introduced as an innovative approach, though its practical security remains uncertain. Collectively, these explorations illustrate the trade-offs between efficiency, ciphertext size, and security, and point toward future directions in strengthening public-key cryptography against advancing computational threats.

Downloads

Download data is not yet available.

References

[1] Cypher Research Laboratories (2006) A brief history of cryptography. 24 January. Available at: https://www.cypher.com.au/crypto_history.htm (Accessed: 25 July 2025)

[2] Diffie, W. and Hellman, M. (1976) ‘New directions in cryptography’, IEEE Transactions on Information Theory, 22(6), pp. 644–654. Available at: https://ieeexplore.ieee.org/document/1055638 (Accessed: 25 July 2025)

[3] Rivest, R.L., Shamir, A. and Adleman, L. (1978) ‘A method for obtaining digital signatures and public-key cryptosystems’, Communications of the ACM, 21(2), pp. 120–126. Available at: https://dl.acm.org/doi/10.1145/359340.359342 (Accessed: 25 July 2025)

[4] Boneh, D. and Durfee, G. (1999) ‘Cryptanalysis of RSA with private key d less than N^0.292’, in Stern, J. (ed.) Advances in Cryptology – EUROCRYPT’99. Lecture Notes in Computer Science, vol. 1592. Berlin, Heidelberg: Springer, pp. 1–11. Available at: https://doi.org/10.1007/3-540-48910-X_1 (Accessed: 25 July 2025)

[5] Shor, P.W. (1994) ‘Algorithms for quantum computation: discrete logarithms and factoring’, Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. Available at: https://doi.org/10.1109/SFCS.1994.365700 (Accessed: 25 July 2025)

[6] Hinek, M.J. (2008) ‘On the security of multi-prime RSA’, Journal of Mathematical Cryptology, 2(2), pp. 117–147

[7] Boneh, D. and Shacham, H. (2002) ‘Fast variants of RSA’, CryptoBytes, 5(1), pp. 1–9

[8] Bernstein, D.J., Chang, Y.-A. and Cheng, C.-M. (2007) ‘Multi-factor RSA’, IACR Cryptology ePrint Archive, 2007:227

[9] Smith, P. and Skinner, C. (1995) ‘A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms’, Journal of Cryptology. Available at: https://doi.org/10.1007/BFb0000447 (Accessed: 28 July 2025)

[10] Sarbini, I.N., Wong, T.J., Koo, L.F., Rasedee, A.F.N., Naning, F.H. and Abdul Sathar, M.H. (2023) ‘Security Analysis on LUC-type Cryptosystems Using Common Modulus Attack’, Journal of Advanced Research in Applied Sciences and Engineering Technology, 29(3), pp. 206–213. doi: 10.37934/araset.29.3.206213

[11] Lehmer, D.H. (1930) ‘An extended theory of Lucas’ functions’, Annals of Mathematics, 31(3), pp. 419–448. Available at: https://doi.org/10.2307/1968235 (Accessed: 29 July 2025)

[12] Sahu, S.K. and Sahu, R.K. (2010) ‘Reduce Computation Steps Can Increase the Efficiency of Computation in Lucas Cryptosystem’, Journal of Computer Science and Security, 6(4), pp. 1203–1207. Available at: https://thescipub.com/pdf/10.3844/jcssp.2010.1203.1207.pdf (Accessed: 29 July 2025)

Downloads

Published

20-03-2026

Issue

Section

Articles

How to Cite

Xu, H., & Sun, Q. (2026). Possible Reinforcements of RSA and Some Other Encryption Methods. International Journal of Computer Science and Information Technology, 8(3), 40-55. https://doi.org/10.62051/ijcsit.v8n3.06